Mapping Cisco Security Solutions to ISO 27001

27 downloads 1075 Views 24MB Size Report
2010 Cisco and/or its affiliates. All rights reserved. 1. Mapping Cisco Security. Solutions to. ISO 27001. Talhah Jarad. Business Development Manager - Security ...
Mapping Cisco Security Solutions to ISO 27001 Talhah Jarad Business Development Manager - Security

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

1

Mapping Cisco Security Solutions to ISO 27001 Talhah Jarad Business Development Manager - Security

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

2

• In this breakout session we will introduce the concept of

standards and frameworks • This session will provide you with a background on the ISO

27001, its evolution, structure, and benefits • This session will show you how to prepare your organization

for the standard by mapping Cisco technologies to the controls • We will also discuss the future challenges that need to be

taken in considerations

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

3

• Introductions to Standards and Frameworks • Benefits of the Standards and Frameworks • ISO 27001 Background • Applying Cisco Technologies to ISO 27001 Controls • Recommendations • Current and Future Considerations

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

4

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

5

 Process  People  Technology (Products)

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

6

Framework: A set of best practices, a model Standard: Reference point against which compliance can be evaluated. Basis for comparison  Alignment: loosely following a framework  Compliance: Implementing a framework to the letter - ISO 27002, ISO 17799  Certification: audited against a standard to be granted its certification - ISO 27001, ISO 20000 You are following a framework and you are being audited against a standard

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

7

Think “CIAA”

1. Confidentiality — Keep it Secret 2. Integrity of Data — Protect against improper alteration or

destruction 3. Availability — Regulated data must be available to

authorized users/consumers 4. Audit/Reporting/Monitoring/Logging — Security activity

must be tracked/auditable to demonstrate compliance and incident investigation

BRKSEC-2008 © 2010 Cisco and/or its affiliates. All rights reserved. 13678_05_2007_c2 © 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

Cisco Confidential

8

8

What are Controls? A control is a mechanism (safety measure) that allows delivering value through the management of risks IT controls are like the brakes on a car. Controls can generate positive results when done correctly. Examples Quality of Service (QoS) Access rule on a firewall Network Admission Control (NAC)

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

9

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

10

 Effectiveness and efficiency of IT activities  Common Language for organization - everyone knows what to do  Structured –an excellent structure that organizations can follow.  Expertise - Cumulative years of experience reflected in the models  Knowledge Sharing – user groups, Web sites, magazines, books  Auditable – to effectively assess control

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

11

 Avoiding re-inventing wheels

For Your Reference

 Overcoming vertical silos and nonconforming behavior  Reducing risks and errors  Improving quality  Improving the ability to manage and monitor  Cost reduction  Improving trust and confidence from management and partners  Improve the status and position of the organization

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

12

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

13

For Your Reference

 It was originally published by a government department in UK (1999)  The original standard was issued in two parts: –BS 7799 Part 1: Information Technology – Code of Practice for Information Security Management –BS 7799 Part 2: Information Security Management System – Specification with Guidance for Use

 In 2002 an associated standards, BS7799-2, was published

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

14

For Your Reference

 The ISO and IEC, published the international standard ISO 17799: 2000  This focused upon information security management systems, rather than security controls themselves  Much more closely aligned with other ISO standards (ISO 9000)  In 2005, ISO 17799 was re-published to reflect changes in technology.  Later in the same year, BS7799-2 also became an ISO standard: ISO 27001

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

15

For Your Reference

 ISO/IEC 27001 was formerly known as BS7799-2.  Not a code of practice, like ISO 17799.  It is the Certifiable Standard  The Information Security Management standard is now in two (2) updated parts: ISO/IEC 17799: 2005 Code of Practice for Information Security Management ISO 27001: Information Security Management Systems (ISMS) Specification

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

16

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

17

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

18

For Your Reference

 ISO/IEC 17799:2005 Code of Practice for Information Security Management –Basis for developing security standards and management practices –Guidance - Use it as a checklist –No audit against

 ISO/IEC 27001: 2005 ISMS Specification – Certifiable & Auditable –Clauses (4 – 8) – Annex A (5 – 15)

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

19

For Your Reference

 ISO/IEC 27003:2010 focuses on the critical aspects needed for successful design and implementation of an Information Security Management System (ISMS) in accordance with ISO/IEC 27001:2005.  It describes the process of ISMS specification and design from inception to the production of implementation plans.  It describes the process of obtaining management approval to implement an ISMS, defines a project to implement an ISMS (referred to in ISO/IEC 27003:2010 as the ISMS project), and provides guidance on how to plan the ISMS project, resulting in a final ISMS project implementation plan.

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

20

For Your Reference

 ISO/IEC 27004:2009 provides guidance on the development and use of measures and measurement in order to assess the effectiveness of an implemented information security management system (ISMS) and controls or groups of controls, as specified in ISO/IEC 27001.  ISO/IEC 27004:2009 is applicable to all types and sizes of organization.

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

21

For Your Reference

 ISO/IEC 27005:2008 provides guidelines for information security risk management. It supports the general concepts specified in ISO/IEC 27001 and is designed to assist the satisfactory implementation of information security based on a risk management approach.  Knowledge of the concepts, models, processes and terminologies described in ISO/IEC 27001 and ISO/IEC 27002 is important for a complete understanding of ISO/IEC 27005:2008.  ISO/IEC 27005:2008 is applicable to all types of organizations (e.g. commercial enterprises, government agencies, non-profit organizations) which intend to manage risks that could compromise the organization's information security.

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

22

For Your Reference

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

23

 16 Sections  11 Security Control Clauses –Annex A (5 – 15)  133 security controls – must be covered and an evidence must be shown for each

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

24

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

25

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

26

1.

Scope

2.

Terms and Definitions

3.

Structure of this Standards

4.

Risk Assessment and Treatment

5.

Security Policy

6.

Organization of Information Security

7.

Asset Management

8.

Human Resources Security

9.

Physical and Environmental Security

10. Communications and Operation Management 11. Access Control 12. Information Systems Acquisitions, Development & Maintenance 13. Information Security Incident Management 14. Business Continuity Management 15. Compliance

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

27

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

28

5. Security Policy (2) 6. Organization of Information Security (11) 7. Asset Management (5) 8. Human Resources Security (9) 9. Physical and Environmental Security (13) 10. Communications and Operation Management (32) 11. Access Control (25) 12. Information Systems Acquisitions, Development & Maintenance (16) 13. Information Security Incident Management (5) 14. Business Continuity Management (5) 15. Compliance (10)

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

29

For Your Reference

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

30

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

31

• The control name and number • The Objective of the control • The detailed control clauses numbered as per the standard. • Cisco Solutions for the detailed control clauses • Cisco Service will be presented for the controls that require

services

• Some non-Cisco will be offered, as deemed necessary • We will delve in to some of the control clauses in details: – Describe the clause, as per the standard – Map the clause requirements to Cisco solutions and services

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

32

• A.5.1 Information Security policy

For Your Reference

Objective: to provide management direction and support for information security in accordance with business requirements and relevant laws and regulations. A.5.1.1 Information security policy document A.5.1.2 Review of the information security policy –Cisco Advanced Services • Build Security Policy (Customer Advocacy Services) • Governance, Risk management, and Compliance (GRC) Security Assessment Services http://wwwin.cisco.com/CustAdv/services/advtech/security/grc/ •Security Architecture Assessment (SAA) http://collaboratory.cisco.com/confluence/display/CAWIKI/SAA+Ordering+and+ Pricing+Detail

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

33

For Your Reference

• A.6.1 Internal organization

Objective: to manage information security within organization. A.6.1.1 Management commitment to information security A.6.1.2 Information Security co-ordination A.6.1.3 Allocation of information security responsibilities A.6.1.4 Authorization process for information processing facilities A.6.1.5 Confidentiality agreements A.6.1.6 Contact with authorities –Cisco Advanced Services http://wwwin.cisco.com/CustAdv/

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

34

For Your Reference

• A.6.1 Internal organization

Objective: to manage information security within organization. A.6.1.7 Contact with special interest groups –Cisco Advanced Services http://wwwin.cisco.com/CustAdv/ –Cisco IntelliShield Alert Manager – Cisco SIO

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

35

Powered by Intellishield and IronPort SensorBase

© 2010 Cisco and/or its affiliates. All rights reserved.

For Your Reference

Cisco Public

36

For Your Reference

Cisco IntelliShield Alert Manager

Threat and vulnerability intelligence alerting service Receive vital intelligence that is relevant and targeted to your Environment • Tactical, operational and strategic

intelligence • Vendor neutral • Life cycle reporting • Vulnerability workflow

management system • Comprehensive searchable alert

database © 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

37

For Your Reference

Cisco IntelliShield Cyber Risk Report (CRR)

• A Strategic Intelligence Report that

Highlights Current Security Activity and Mid-to Long-range Perspectives • Addresses seven major risk

management categories: vulnerability, physical, legal, trust, identity, human, and geopolitical. • The CRRs are a result of collaborative

efforts, information sharing, and collective security expertise of senior analysts from Cisco security services that include the IntelliShield and IronPort teams

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

38

For Your Reference

Cisco Applied Mitigation Bulletin Actionable intelligence that can be used with your existing Cisco infrastructure • Vulnerability Characteristics • Mitigation Technique Overview • Risk Management • Device-Specific Mitigation

and Identification Cisco IOS® Routers and Switches Cisco IOS NetFlow Cisco ASA, PIX®, and FWSM Firewalls Cisco ACE Application Control Engine Cisco Intrusion Prevention System Cisco Security Monitoring, Analysis, and Response System

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

39

http://www.cisco.com/go/cafe © 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

40

 SAFE Poster  Security Annual Report  Security Intelligence Operations  Secure Borderless Networks  Security Solutions Quick Reference Guide  Security TrustSec ROI Tool

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

41

• A.6.1 Internal organization

Objective: to manage information security within organization. A.6.1.8 Independent review of information security –Cisco Advanced Services •Security Architecture Assessment (SAA) –Internal SAA, Perimeter SAA, Wireless SAA, UC SAA, DC SAA, Endpoint SAA, Firewall rules assessment, Physical SAA http://collaboratory.cisco.com/confluence/display/CAWIKI/SAA+Ordering +and+Pricing+Detail •Security Posture Assessment (SPA)

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

42

For Your Reference

 A.6.2 External Parties Objective: to maintain the security of the organization's information and information processing facilities that are accessed, processed, communicated to, or managed by external parties A. 6.2.1 Identification of risks related to external parties A.6.2.2 Addressing security when dealing with customers A.6.2.3 Addressing security in third party agreements –Cisco Advanced Services • Build security policy • Governance, Risk management, and Compliance (GRC) Security Assessment Services http://wwwin.cisco.com/CustAdv/services/advtech/security/grc/

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

43

• A.7.1 Responsibility for Assets

Objective: to achieve and maintain appropriate protection of organizational assets. A.7.1.1 Inventory of assets –Switches, routers, wireless access points, IP telephony systems, PCs, laptops, servers, printers, IP cameras, etc. –CiscoWorks (element manager) –Cisco NAC profiler –Cisco Security Manager (CSM) –UC/IPT UCMM –Cisco Prime –Cisco ISE (Identity Service Engine)

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

44

Endpoints • Cisco Prime Network Control System (NCS)

CM

Services NCS

LMS

• Cisco Prime LAN Management Solution (LMS)

NAM

• Cisco Prime Collaboration Manager (CM) • Cisco Prime Network Analysis Module (NAM)

Network Simple and Efficient Management Across Architectures, Networks, and Services

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

45

Cisco Prime Day-One Device Support

Optimized Operations Experience Integrated Cisco Best Practices Complete Lifecycle Management

Data Center

Collaboration

Borderless Networks

Smart Interactions

Physical and Virtual Appliance

Simple and Efficient Management Across Architectures, Networks, and Services

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

46

Optimized Operations Experience

• Common user interface • Intuitive user experience • Optimized operator workflows

Integrated Cisco Best Practices • Guided deployment of Ciscovalidated best practices • Automated troubleshooting and diagnostics

© 2010 Cisco and/or its affiliates. All rights reserved.

Complete Lifecycle Management

• End-to-end lifecycle • ITIL-aligned operations • Northbound integration to customer back office

Day-One Device Support • Support for new devices and technologies upon shipment • Nondisruptive support upgrades

Smart Interactions

• Contextbased help tool • Real-time access to Cisco support community • Automated Cisco TAC case creation and management

Physical and/or Virtual Appliance • Two delivery options • Both options fully selfcontained • Includes operating system, software application, database, and CLI

Cisco Public

47

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

48

An enterprise LAN is comprised of myriad endpoint types. Most are undocumented (think DHCP).

Enterprises without VoIP

Enterprises with VoIP

Wired Endpoints Distribution

Wired Endpoints Distribution

50% Windows

50% Other

33% Windows

33% IP phones

33% Other

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

49

Printers

IP Cameras

Alarm Systems

Fax Machines

Wireless APs

Turnstiles

Video Conferencing Stations

Managed UPS

HVAC Systems

Cash Registers

RMON Probes

Medical Imaging Machines

Vending Machines

IP Phones Hubs

. . . and many others © 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

50

PCs

Non-PCs UPS Phone Printer AP

Discovery

Endpoint Profiling Discover all network endpoints by type and location Maintain real time and historical contextual data for all endpoints

Monitoring

Cisco NAC Profiler

Behavior Monitoring Monitor the state of the network endpoints Detect events such as MAC spoofing, port swapping, etc.

© 2010 Cisco and/or its affiliates. All rights reserved.

Automated process populates devices into the NAC Manager; and subsequently, into appropriate NAC policy

Cisco Public

51

Authenticate & Authorize All endpoints are now authenticated “Authentication” for non-agent devices MAC Address is to Username as Behavior is to Credential

Scan & Evaluate Continuous evaluation and monitoring of endpoint behavior and status Passive and active techniques

© 2010 Cisco and/or its affiliates. All rights reserved.

Quarantine & Enforce Compromised MAC Addresses or devices are dynamically quarantined All leverage NAC Appliance policy model for enforcement

Update & Remediate Detailed, location-based Help Desk interaction Ongoing maintenance of the enterprise asset inventory list

Cisco Public

52

Categorization Profiling Example Cisco IP Phone

Monitoring

Discovery

Profiler

Collector HP Printer

Endpoint Profiling Discover all network endpoints by type and location. NAC Profiler

Device Monitoring Maintain real-time and historical contextual data for all endpoints.

Non-802.1X Devices On Your Network

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Surveillance Camera UPS NonsupplicantAware OS

Cisco Public

53

Next Generation Solution Portfolio Identity & Access Control Access Control Solution

Identity & Access Control + Posture NAC Manager NAC Server ISE

Device Profiling & Provisioning + Identity Monitoring

ISE NAC Profiler NAC Collector Standalone appliance or licensed as a module on NAC Server

Guest Lifecycle Management NAC Guest Server © 2010 Cisco and/or its affiliates. All rights reserved.

NAC Agent Cisco Public

54

• A.7.1 Responsibility for Assets

Objective: to achieve and maintain appropriate protection of organizational assets. A.7.1.2 Ownership of assets –Partially through Role/Rule Based Access Control –Cisco Security Manager (CSM) –Cisco ACS (AAA) /ISE –Cisco TrustSec (CTS) –Cisco Advanced Services (Documentation)

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

55

Firewall VPN IPS

ASA 5500 Series

IDSM-2

FWSM

AIP-SSM

VPN SPA

3000 and 4000 Series Switches

IPS 4200 Series

IPS AIM

Catalyst 6500 Series

© 2010 Cisco and/or its affiliates. All rights reserved.

7600 Series

Integrated Services Routers (800, 1800, 2800, 3800 Series)

Cisco Public

56

Integrated Security Configuration Management

Firewall Management

VPN Management

IPS Management

Productivity

 Support for Cisco® PIX® Firewall, Cisco Adaptive Security Appliance (ASA), Cisco Firewall Services Module (FWSM), and Cisco IOS® Software Routers

 Support for Cisco PIX Firewall, Cisco ASA, VPN services module (VPNSM), VPN shared port adapter (SPA), and Cisco IOS Software routers

 Support for IPS sensors and Cisco IOS IPS

 Unified security management for Cisco devices supporting firewall, VPN, and IPS

 Rich firewall rule definition: shared objects, rule grouping, and inheritance

 Support for wide array of VPNtechnolgies, such as DMVPN, Easy VPN, and SSLVPN

 Powerful analysis tools: conflict detection, rule combiner, hit counts, …

© 2010 Cisco and/or its affiliates. All rights reserved.

 VPN wizard for 3-step pointand-click VPN creation

 Automatic policy-based IPS sensor software and signature updates  Signature update wizard allowing easy review and editing prior to deployment

 Efficient management of up to 5000 devices per server  Multiple views for task optimization - Device view - Policy view - Topology view

Cisco Public

57

• A.7.1 Responsibility for assets

Objective: to achieve and maintain appropriate protection of organizational assets. A.7.1.3 Acceptable use of assets -NAC – Acceptance Usage Policy (AUP) -WSA (Iron Port) AUP -Cisco GRC (Governance, Risk, Compliance)

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

58

A Powerful, Secure Web Gateway Solution • Most effective defense against web-based malware • Visibility and control for acceptable use and data loss • High performance to ensure best end-user experience • Integrated solution offering optimum TCO

Management and Reporting

Acceptable Use Policy

Malware Defense

Data Security

AsyncOS for Web © 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

59

 Real-time insights - Visibility into web usage and trends - Monitor acceptable use trends - Identify risky user behavior

 Extensive Forensic Capabilities - Investigate acceptable use violations - Drill down for further analysis - Satisfy compliance requirements

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

60

Comprehensive Management and Visibility • Flexible policy management Per user, per group policies Multiple actions, including block, warn and monitor Time-based policies Custom categories and notifications Guest Policies • Visibility Easy-to-understand reports Extensive logging Comprehensive alerting

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

61

 A.7.2 Information classification Objective: to ensure that information receives an appropriate level of protection A.7.2.1 Classification guidelines A.7.2.2 Information labeling and handling –MPLS Tagging –VLANs –QoS (DSCP/IP precedence) –WSA and ESA (IronPort)

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

62

Internet Internet IronPort SenderBase

BLOCK Incoming Threats

APPLICATION-SPECIFIC SECURITY GATEWAYS

ENCRYPTION

EMAIL

WEB

Appliance

Security Appliance

Security Appliance

CENTRALIZE Administration PROTECT Corporate Assets Data Loss Prevention Security MANAGEMENT Appliance

Web Security | Email Security | Security Management | Encryption

© 2010 Cisco and/or its affiliates. All rights reserved.

CLIENTS

Cisco Public

63

• 30B+ queries daily • 150+ Email and Web parameters • 25% of the World’s Traffic • Cisco Network Devices

Combines Email & Web Traffic Analysis  View into both email & Web traffic dramatically improves detection IronPort SenderBase

 80% of spam contains URLs  Email is a key distribution vector for Web-based malware  Malware is a key distribution vector for Spam zombie infections © 2010 Cisco and/or its affiliates. All rights reserved.

IronPort EMAIL

IronPort WEB

Security Appliances

Security Appliances

Cisco Public

64

Ubiquitous Path In and Out of Enterprise Networks  Growing business web usage

FTP

SOAP

IM

RPC

Video

 Growing tunneled apps usage

HTTP is the New TCP © 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

65

• Native control for HTTP, HTTPs, FTP applications • Selective decryption of SSL traffic for security and policy • Policy enforcement for applications tunneled over HTTP—FTP, IM, video • Application traversal using policy-based HTTP CONNECT

Collaboration

Software as a Service

Tunneled Applications ftp://ftp.funet.fi/pub/

© 2010 Cisco and/or its affiliates. All rights reserved.

HTTP

Cisco Public

66

• A.8.1 Prior To Employment

For Your Reference

Objective: to ensure that employees, contractors, and third party users understand their responsibilities, and are suitable for the roles they are considered for, and to reduce the risk of theft, fraud or misuse of facilities. A.8.1.1 Roles and responsibilities A.8.1.2 Screening A.8.1.3 Terms and conditions of employment –Cisco Advanced Services (to create policies)

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

67

 A.8.2 During Employment Objective: to ensure that all employees, contractors, and third party users are aware of the information security threats and concerns, their responsibilities and liabilities, and are equipped to support organizational security policy I the course of their normal work, and to reduced the risk of human error.

A.8.2.1 Management responsibilities A.8.2.2 Information security awareness, education and training –CCSP, CCIE for technical staff, CISSP, Security+ –Cisco Security Intelligence Operations (SIO) –Cisco Digital Media Signage –Cisco Webex (online and recorded sessions) –Cisco TelePresence and Tandberg Solutions –Cisco Advanced Services

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

68

For Your Reference

Key Components Powerful Ecosystem Enables Fast, Accurate Protection

• World’s biggest, broadest and best traffic monitoring network

Cisco SensorBase

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Threat Operations Center • Global operation provides high responsiveness and accuracy

• Dynamic updates and actionable intelligence ensure fast, accurate protection

Advanced Protection

Cisco Public

69

For Your Reference

Sophisticated Security Modeling and Remediation • Advanced algorithms Dynamic real-time scoring Fast threat identification Automated rule and/or signature creation Human-aided rule creation • White Hat engineers Penetration testing

Product & Customer Feedback

Global Correlation

Supervised Learning

Real-Time Anomaly Detection

Unsupervised Learning

Botnet infiltration Malware reverse engineering

© 2010 Cisco and/or its affiliates. All rights reserved.

Reputation Scoring

Cisco Public

70

Cisco Digital Media Signage • The Cisco Digital Media System solution suite

comprises products for the creation, management and access of digital media. • Integrate the video surveillance system with the

Cisco Unified Communications system and Cisco digital signage system

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

71

For Your Reference

 A.8.2 During Employment Objective: to ensure that all employees, contractors, and third party users are aware of the information security threats and concerns, their responsibilities and liabilities, and are equipped to support organizational security policy I the course of their normal work, and to reduced the risk of human error.

A.8.2.3 Disciplinary process –Cisco Advanced Services (create policies)

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

72

 A.8.3 Termination or Change of Employment Objective: to ensure that employees, contractors, and third party users exit an organization or change management in an orderly manner. A.8.3.1 Termination responsibilities A.8.3.2 Return of assets –RFID Tagging A.8.3.3 Removal of access rights –Cisco ACS (AAA) /Cisco ISE

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

73

TACACS+

Change Password

Identity Stores

RSA SecurID

Protocols

Admin

Policy

Monitoring and Troubleshooting

EAP-FAST with GTC inner

New Roles

Network Access Restrictions (NARs)

Customizable Dashboard

Default Device Definition

Expert Troubleshooter

PEAP with GTC inner

Cert Enhancements

Syslog Event Notification

LEAP Custom Attributes

Access Restrictions

Token Servers CHAP

Custom Services

RADIUS Proxy

© 2010 Cisco and/or its affiliates. All rights reserved.

MS-CHAPv1

Password Enhancements

MS-CHAPv2

Web Services & Scripting

New Catalog Reports EAP-TLS Cert comparison against AD

Data Export

Cisco Public

74

Username: admin Password: ***** switch# conf t

Network Access

Device Administration

Authenticate users to the network

Authenticate users to network devices

Apply per user policies

Control levels of access to commands

Audit & report on network access

Audit & report on configuration changes

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

75

For Your Reference Monitor

Provision Troubleshoot and Report

Infrastructure Enforcement

Integrate and Enforce

Cisco Secure Access Control System (ACS) Powerful, Visible, Simple

ACCESS

Interact and Query

Identity Systems, NAC Profiler, NAC Guest

Wireless, Wired or Remote

Access Device

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

76

For Your Reference

Alarms and Notifications  Custom Triggers  Alerts via Email and Syslog

Comprehensive Reporting  Standard Reports  Templates  Customized Reports

Fully Configurable Dashboard © 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

77

• A.9.1 Secure Areas

Objective: to prevent unauthorized physical access, damage and interferences to the organization’s premises and information. A.9.1.1 Physical security perimeter -Cisco Video Surveillance Solution -Cisco Video Surveillance Manager (VSM) -Cisco Video Surveillance Operation Manager (VSOM) -Cisco Video Surveillance Virtual Matrix (VSVM) -Cisco IP Cameras -Cisco Video Surveillance Storage

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

78

 Video Encoders/IP Cameras

• Source of digital video over IP. • Compressed MJPEG, MPEG2, MPEG4.

 Video and Application Servers

• Linux servers for streaming video between cameras, storage and viewers. May also run a Web server or application sever for delivering a Web application. • VSMS – VSOM - VSVM

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

79

Cisco Physical Security Solution Components  Network

• TCP/IP network, typically on Ethernet. • Conventional switches and routers.

 Storage • Redundant RAID storage • Direct Attached, SAN or iSCSI

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

80

 Client Stations

• Windows PCs for video decoding, display and control. • Running Web browsers or specialized Windows applications.

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

81



Provides real-time remote monitoring w/virtual matrix switching (VSVM)



Display live and archived video streams with high quality images.



PTZ control and presets



Review and clip archives

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

82

• A.9.1 Secure Areas

Objective: to prevent unauthorized physical access, damage and interferences to the organization’s premises and information. A.9.1.2 Physical entry controls - Cisco Physical Access Control A.9.1.3 Securing offices, rooms, and facilities - Cisco Physical Access Control

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

83

Cisco Physical Access Gateways • Connects door locks and readers to the IP

network • Controls up to thousands of doors • Directly configurable through a built-in Web

server • Supports offline operations if network

connectivity is lost • 250,000 credentials can be cached and

encrypted • 150,000 events can be buffered by the door

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

84

Cisco Physical Access Manager • Management application for configuring

hardware, monitor activity, and enroll users • Supports a comprehensive list of

Event Photos Module Graphic Map Module URL Actions & Controls

access control policies • Easy integration with other IT systems • Flexible reporting capability • Easy access to video through

integration with Cisco Video Surveillance Manager

© 2010 Cisco and/or its affiliates. All rights reserved.

Quick Launch Bar, Integrated Video

Cisco Public

85

Cisco Physical Access Manager • New Form factor Software can be ordered on new MSP 1RU servers, simplifying ordering & deployment • Web Services API Optional Web Services API to provide programmable access from any client application PSIM Integration: Integration with Proximex Visitor Management Integration: API for easy integration with visitor management applications • Bulk Image upgrade Allows flexible firmware upgrade for all or a group of hardware devices, thereby lowering TCO • Usability improvements

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

86

Electronic Access Control architectures today…. Door Control Panels

Up to 32

Serial / RS485

IP Networ Network k Mgmt Central Controllers/ Access Panels

Server

• Complex & expensive to design, deploy and maintain • Not capable of incremental deployment : Upfront design cycle required • Separate power circuit required to power door hardware

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

87

Cisco Physical Access Control Overview •A Comprehensive Solution for Electronic Access Control •Leverages IP infrastructure, integrates with other Physical Security applications • Hardware: Cisco Access Gateway connects existing door hardware (readers, locks etc.) to the network Additional doors can be managed by connecting expansion modules to the Access Gateway • Software Cisco Physical Access Manager (Cisco PAM) is a Management Appliance for configuration, monitoring and report generation.

© 2010 Cisco and/or its affiliates. All rights reserved.

Presentation_ID

Cisco Public

88

Deployment Architecture Cisco Physical Access Gateway

Layer 2 Switch

POE

Cisco Physical Access Manager

LDAP / Microsoft Active Directory

IP Network LAN/WAN

Other IT Apps

HR Database Scalable Modular Architecture, easily integrated with IT application data

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

89

Cisco Physical Access Manager (Cisco PAM) 1 RU Appliance Java Thin Client Architecture Policy Support: Two-Door, Anti-Passback Report Generator (Canned & Custom) Badge Design & Enrollment Microsoft Active Directory integration Fine grained user rights Global I/O Device Pre-Provisioning

Cisco PAM

Capacity & Feature Licenses IP Network

IT Data integration Warm Standby High Availability Audit Trails

© 2010 Cisco and/or its affiliates. All rights reserved.

Java Thin Clients

Cisco Public

90

Cisco PAM High Availability

Warm standby with database replication between two Cisco PAM instances Virtual IP address for client transparency: both IP addresses bonded to a single virtual IP address Secondary server takes over when primary fails Secondary server only requires a HA license: acquires all primary licenses

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

91

Cisco Video Surveillance Manager (VSM) integration

Event Video integration with Cisco VSM

Dynamically acquires camera inventory stored in Cisco VSM. Automatically tracks inventory. Allows association of cameras to doors.

For every event by the door, recorded and live video can be viewed, PTZ presets can be changed.

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

92

• A.9.1 Secure Areas

Objective: to prevent unauthorized physical access, damage and interferences to the organization’s premises and information. A.9.1.4 Protecting against external and environmental threats A.9.1.5 Working in secure areas -Cisco physical access control -Cisco video surveillance solution -Cisco Cameras -Cisco IPICS

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

93

Cisco IPICS • Cisco Interoperability and Collaboration System is

an intelligent resource management application that orchestrate resources, media, and information • IPICS consists of

-IPICS Server -Land Mobile Radio Gateways -Push-to-Talk Media Clients -Cisco IP Phone PTT Clients -Cisco Policy Engine • Effectively manage communications across

distributed radio systems, locations, and networks.

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

94

Cisco IP Phones and IPICS • The IPICS XML IP-Phone client provides

Push-to-Talk service for Cisco IP phones • Secure access to radio PTT talkgroups

and channels from anywhere in the UC network • Available on a wide range of IP-phones

including wireline and WiFi IP-phones • Intuitive user interface with smooth

transition between telephony and radio communications

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

95

For Your Reference

• Cisco Interoperability and Collaboration

System (IPICS) takes incident response to the next level • IPICS allows multiple safety and security

organizations to quickly share vital incident information, including live mobile video, across previously isolated radio networks • IPICS integrates with Cisco Video

Surveillance, Cisco Physical Access Control, and third-party applications, further enhancing situational awareness, response time, operational efficiency and cross-agency collaboration during a critical event.

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

96

• New Form factor Software can be ordered on new MSP 1RU servers, simplifying ordering & deployment • High Availability improving 24/7 reliability Active/standby servers providing no single point of failure within IPICS solution Can be co-located or geographically distributed (minimum T1) • Loop prevention of patches • Radio pooling Can pool serial and tone controlled radios so that dispatchers simply select channels Improved TCO/ ROI from fewer radio and networking resources

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

97

Unified Communications Command and Control

For Your Reference

• Communicate with on-site

personnel using all media • Push video, images and data to

first responders • Collaborate with first

responders and other organizations • Use with any radio network for

smooth evolution to new radio protocols (P25, Tetra)

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

98

Situational awareness and collaboration

For Your Reference

• App for Apple iPhone • Integrated PTT w/Radio interoperability • Rich-media incident management Increased Situational Awareness Increased Collaboration – Citizens / Others View Incidents, status, media Receive / send video, images • 3G and WiFi Support • Secure access

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

99

For Your Reference

• A.9.1 Secure Areas

Objective: to prevent unauthorized physical access, damage and interferences to the organization’s premises and information. A.9.1.6 Public access, delivery and loading areas -Cisco physical access control -Cisco Video surveillance solution -Cisco Cameras

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

100

For Your Reference

 A.9.2 Equipment Security Objective: to prevent loss, damage, theft or compromise of assets and interruption to the organization’s activities

A.9.2.1 Equipment sitting and protection – RFID A.9.2.2 Supporting utilities – Air Conditioning (AC), Uninterruptible Power Supply (UPS), power supply, data center setup A.9.2.3 Cabling security

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

101

For Your Reference

 A.9.2 Equipment Security Objective: to prevent loss, damage, theft or compromise of assets and interruption to the organization’s activities

A.9.2.4 Equipment maintenance – GOLD, EEM, CallHome Alerts –SMARTnet, Smart Care, and other Cisco maintenance services –IBLM (Install Base Lifecycle Management)

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

102

Cisco TAC investigates problem and suggests remediation including shipping replacement parts if necessary

Customer implements remediation and replaces faulty part (if applicable)

Sends message to Cisco TAC with precise information and diagnostics Detects GOLD events and sends to Call Home GOLD runs diags, isolates fault and precise location © 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

103

For Your Reference

 A.9.2 Equipment Security Objective: to prevent loss, damage, theft or compromise of assets and interruption to the organization’s activities

A.9.2.5 Security of equipment off-premises A.9.2.6 Secure disposal or re-use of equipment A.9.2.7 Removal of property – RFID –Cisco Video surveillance solution

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

104

• A.10.1 Operational Procedures and Responsibilities

For Your Reference

Objective: to ensure the correct and secure operation of information processing facilities A.10.1.1 Documented operating procedures – Cisco Advanced Services A.10.1.2 Change management – ACS (access side) –CSM (approval process) –CiscoWorks

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

105

For Your Reference

• A.10.1 Operational Procedures and Responsibilities

Objective: to ensure the correct and secure operation of information processing facilities A.10.1.3 Segregation of duties – Cisco ACS and using RBAC – Cisco NAC –.1x –Cisco TrustSec

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

106

• A.10.1 Operational Procedures and Responsibilities

Objective: to ensure the correct and secure operation of information processing facilities A.10.1.4 Separation of development, test, and operational facilities – VLANs –DMZs –Virtualization –ASA – Virtual Firewalls – Cisco IOS Zone Based Firewall –Nexus 1000v –MPLS VPN and VRFs

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

107

• Dynamic VLAN assignment

Employee Servers

Cisco Secure ACS RADIUS

• Dynamic security policy assignment

using ACLs • Identity Networking-based user/port

accounting

Employee Contractor

© 2010 Cisco and/or its affiliates. All rights reserved.

Guest

Cisco Public

108

• Virtual firewall—when a single firewall device can

support multiple contexts • A context defines connected networks and the policies

that the firewall enforces • Security policies (ACL, NAT, app inspection) IP address space (overlapping permitted across contexts) An operational mode: either routed or transparent • Virtual firewall allows a device to enforce many (up to

100s) policies between different networks

• Caveat is that virtual often means smaller as

processing power of all the virtual firewall adds up to the original appliance

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

109

For Your Reference

Context Hierarchy Admin Context Remote Root Access

A Admin (Mandatory)

B

(mandatory)

C

System Execution Space

Security Contexts SSH, Telnet, IPSec, Https

• Inside a context, almost all features are virtualized, e.g., one

context can syslog to IP 10.10.50.1 while another context sends syslog only for severity 3 messages to IP 192.168.1.5

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

110

For Your Reference

• Security contexts (virtual firewalls)

lower operational costs Core/Internet

• Reduce overall management and

support costs by hosting multiple virtual firewalls in a single appliance Enables the logical partitioning of a single Cisco ASA security appliance into multiple logical firewalls, each with their own unique policies and administration Each context provides the same primary firewall features provided by a standalone Cisco PIX Security Appliance Supports up to 100 contexts, depending on platform

Cisco Catalyst 6500/7600 Series

MSFC

VLAN 10

VLAN50 VFW

VLAN 11

VLAN 20 VLAN 30

VFW

VFW

Shared VLAN

VFW

VFW

VLAN 21 VLAN 31

A

• Ideal solution for enterprises

consolidating multiple firewalls into a single larger appliance, or service providers who offer managed firewall or hosting services © 2010 Cisco and/or its affiliates. All rights reserved.

B

Cisco Public

111

Mail

ISP

Internet Access

DNS

DMZ

Web Apps

© 2010 Cisco and/or its affiliates. All rights reserved.

Finance

Corporate Core

Dev

Ops

Cisco Public

112

DNS

Email

VLAN20

Internet

VLAN21

Trunk

Trunk

VLAN22

Web Apps

© 2010 Cisco and/or its affiliates. All rights reserved.

Finance VLAN10

Dev VLAN11 VLAN12

Ops

Cisco Public

113

• Allows grouping of physical and virtual

interfaces into zones

 Stateful Inspection

• Firewall policies are applied to traffic

traversing zones

 Application inspection: instant message, POP, IMAP, SMTP/ESMTP, HTTP  URL filtering

• Simple to add or remove interfaces and

integrate into firewall policy Private-DMZ Policy DMZ-Private Policy

Supported Features

 Per-policy parameter  Transparent firewall  VRF-aware firewall

DMZ Public-DMZ Policy

Trusted

Internet

Untrusted

Private-Public Policy

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

114

Data Center

Telecommuter

Extranet Business Partner

Corporate Network

Wireless LAN

Internet Extranet: Business Partner Access

Corporate Office Remote Branch Office Remote Access Users

© 2010 Cisco and/or its affiliates. All rights reserved.

Internal Segmentation

DMZ: Inbound Public Internet Services

Outbound Client Internet Access

Cisco Public

115

1. vMotion moves VMs across physical ports—the network policy must follow 2. Impossible to view or apply network policy to locally switched traffic Port Group

3. Need shared nomenclature and collaboration for security policies between network and server admin vCenter Physical Switch Interface

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

116

    

Industry’s most advanced software switch for VMware vSphere Built on Cisco NX-OS Compatible with all switches Compatible with all servers on the VMware Hardware Compatibility List Winner of VMworld Best in Show 2008 and Cisco Most Innovative Product of 2009

VM

VM

VM

VM

Nexus 1000V vSphere

Nexus 1000V

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

117

For Your Reference

 A.10.2 Third Party Service Delivery Management Objective: to implement and maintain the appropriate level of information security and service delivery in line with third party service delivery agreements

A.10.2.1 Service delivery –Cisco Advanced services A.10.2.2 Monitoring and review of third party services –IPS (for data transmission) –Cisco Advanced Services (Audit) A.10.2.3 Managing changes to third party services – IBM Tivoli or HP OpenView

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

118

 A.10.3 System Planning and Acceptance Objective: to minimize the risk of systems failures A.10.3.1 Capacity management –NAM (Network Analysis Module) –Netflow technology – Cisco EnergyWise for energy consumption and optimization

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

119

Converges IT and facility networks  Innovative solution on Cisco Catalyst switching and routing portfolio  Enables reduction of greenhouse gas (GhG) emissions  Drives significant cost savings  Monitors, reports, and reduces energy usage across entire business  Manages PoE network devices as well as desktop and laptop  Provides compelling reports for policy optimization, troubleshooting, and demonstration of energy

“Forrester analyst Doug Washburn said the initiative comes at a good time as companies are looking to go both green and also cut costs. If they get on board, he said, there could be some significant savings beyond IT.”

– Ryan Kim, San Francisco Chronicle

© 2010 Cisco Systems, Inc. All rights reserved.

– Andrew Hickey, CRN Canada Online

Cisco Public

© 2010 Cisco and/or its affiliates. All rights reserved.

Presentation_ID

“‘Going green has been an industry buzzword for the past couple of years, but Cisco Systems …put its money where its mouth is to help organizations chop energy costs and reduce their carbon footprints with software that can manage devices and systems that gobble up power.”

Cisco Confidential

120

120

 A.10.3 System Planning and Acceptance Objective: to minimize the risk of systems failures

For Your Reference

A.10.3.2 System acceptance –Services (Staging) from Cisco or partner

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

121

• A.10.4 Protecting Against Malicious and Mobile Code

Objective: to protect the integrity of software and information A.10.4.1 Controls against malicious code –Cisco NAC solution –Cisco IPS –WSA and ESA (Iron Port) –Botnet filter (on ASA) –Global correlation (on IPS) –Netflow for anomaly –Cisco Intellishield

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

122

Botnet Traffic Filter on ASA 5500 Series • Monitors malware traffic Scans all traffic, ports & protocols Detects infected clients by tracking rogue “phone home” traffic

Command and Control

• Highly accurate Identifies100,000s of malware connections per week Automatic DNS lookups of addresses

Cisco ASA

Dynamic database integrated into Cisco Security Intelligence Operations

Infected Clients

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

123

Top Botnet Sites, Ports and Infected Endpoints

Live Dashboard

Monitoring

© 2010 Cisco and/or its affiliates. All rights reserved.

Integrated Reporting

Cisco Public

124

Significantly Increasing Accuracy  Powerful preventive defense Blocks 20% of threats before attacks occur (micro to macro)  Two-way policy decision

Cisco Intrusion Prevention Solution

Block “known bad” traffic Pass other traffic to the next stage for further inspection  Real-time updates IPS Reputation Filters

Pass traffic on for further inspection

AntiEvasion

Cisco IPS has TWICE the IPS deployments of any other vendor Block “known bad”

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

125

Remote/Branch Office Data Center

Management Network

Internet Connections Corporate Network

Internet

Corporate LAN Remote Access Systems

Business Partner Access Extranet Connections

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

126

Remote/Branch Office Data Center

Endpoint Protection STOP

Management Network GO

 Infection remediation: desktop anti-virus; Microsoft and other antispyware SW

Internet Connections Corporate Network

Internet

STOP

Corporate LAN

GO GO

Remote Access Systems

Network Admission Control

STOP GO

 Ensure endpoint policy compliance © 2010 Cisco and/or its affiliates. All rights reserved.

Network-Based Content Control Business Partner  Multi-function Accesssecurity devices  Firewalls Extranet  IPS Connections  Web Security / Proxy  Email Security Cisco Public

127

Global Correlation in Action Network IPS to Global IPS 08:00 GMT

For Your Reference

• A sensor in Australia detects

new malware • A sensor in Russia detects a botnet

issuing new commands • A sensor in Korea detects a virus

mutating • A sensor in Florida detects a hacker

probing major financial institutions

Fast, Complete & Accurate Protection Using Global IPS Data

08:15 GMT • All Cisco IPS customers protected

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

128

• A.10.4 Protecting Against Malicious and Mobile Code

Objective: to protect the integrity of software and information A.10.4.2 Controls against mobile code –Cisco secure Desktop CSD –Cisco AnyConnect –Cisco IPS – Cisco WSA and ESA (IronPort web and mail filtering)

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

129

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

130

 A.10.5 Back-up Objective: to maintain the integrity and availability of information and information processing facilities

For Your Reference

A.10.5.1 Information back-up –Storage replication solution

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

131

For Your Reference

 A.10.6 Network Security Management Objective: to ensure the protection of information in networks and the protection of the supporting infrastructure

A.10.6.1 Network controls – Cisco ASA – Cisco IPS –VPN – Cisco WSA and ESA (IronPort) –Borderless Networks security approach

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

132

Industry’s Most Proven Firewall • Most widely deployed network

security platform

Cisco Adaptive Security Appliances

Millions of devices deployed 100,000s of installations • High performance, adaptive

solution • 15 years of investment, 1,000s of

security engineers • Common Criteria EAL4+; industry’s

broadest coverage

Granular Access Controls Advanced Threat Protection Secure Connectivity Secure Unified Communications Comprehensive Management

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

133

Cisco Architecture for the Advanced Next Generation Firewall Management and Operations

Access Control

Protocol Inspection

Threat Protection

Secure Connectivity

Secure Unified Communications

Adaptive Security Appliance Platform

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

134

Powerful Market-Proven Capabilities

Management and Operations

Access Control

Protocol Inspection

Threat Protection

Secure Connectivity

Secure Unified Communications

Adaptive Security Appliance Platform    

High-performance, scalable platform Enterprise-class availability Intelligent networking services Virtualized and transparent operations

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

135

Enterprise-Class Availability Maximizing Uptime

High Availability • Full-meshed Active/Standby and Active/Active • Full application state synchronization

Reliability & Resilience • 2X reliability of a serverbased solution Typical server: 50-65K hrs* Cisco ASA: 100-150K hrs*

• Zero downtime upgrades

• Redundant power supplies

• Sub-second failover

• Multi-level resiliency prevents component, link, system failure

* MTBF calculation based on Telcordia (Bellcore) SR-332. © 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

136

Versatile Deployments Virtual Firewalls and Transparent Operation Virtual Firewalls Dept/Cust 1

Dept/Cust 2

Transparent Operation Dept/Cust 3

Transparent Firewall and IPS

Existing Network

• Fully virtualized ASA contexts • Enables device consolidation &

segmentation • Supports separate policies &

administration

© 2010 Cisco and/or its affiliates. All rights reserved.

 Operates at layer 2, transparent to the network  Drops into existing networks without re-addressing  Simplifies internal firewalling & network segmentation Cisco Public

137

For Your Reference

 A.10.6 Network Security Management Objective: to ensure the protection of information in networks and the protection of the supporting infrastructure

A.10.6.2 Security of network services

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

138

For Your Reference

 A.10.7 Media Handling Objective: to prevent unauthorized disclosure, modification, removal or destruction of assets, and interruption to business activities

A.10.7.1 Management of removable media (note procedures) – CSD, SME (Storage Media Encryption) A.10.7.2 Disposal of media –CSD, SME (Storage Media Encryption) A.10.7.3 Information handling procedures –CSD, SME (Storage Media Encryption)

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

139

For Your Reference

 A.10.7 Media Handling Objective: to prevent unauthorized disclosure, modification, removal or destruction of assets, and interruption to business activities

A.10.7.4 Security of system documentation –Cisco Secure Desktop (CSD) –IronPort –SME (Storage Media Encryption) –ACS for logical access/ ISE –Cisco physical security solution for physical access

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

140

A.10 Communication and Operations Management (Cont’d) • A.10.8 Exchange of Information

Objective: to maintain the security of information and software exchanged within an organization and with any external entities A.10.8.1 Information exchange policies and procedures A.10.8.2 Exchange agreements A.10.8.3 Physical media in transit A.10.8.4 Electronic messaging –ESA (IronPort) email encryption –SSL VPN –ASA (application inspection)

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

141

Application Layer Protection • Application-aware inspection Strong security Granular policy controls • Application-layer controls Perform conformance checking State tracking Security checks and more • Over 30 inspection engines

© 2010 Cisco and/or its affiliates. All rights reserved.

Unified Communications

Database & OS Services

SIP SCCP (Skinny) H.323 v1–4 GTP (3G Mobile Wireless) MGCP TRP/RTCP/RTSP TAPI/JTAP

Oracle/SQL*Net (V1/V2) Microsoft RPC/DCE RPC NFS ILS/LDAP Sun RPC/NIS+

Core Protocol Support

Enterprise Applications

HTTP/HTTPS FTP/TFTP SMTP/ESMTP DNS/EDNS TCP/UDP

Microsoft Windows Messenger Microsoft NetMeeting Real Player Cisco IP Phones Cisco SoftPhones

Cisco Public

142

A.10 Communication and Operations Management (Cont’d) • A.10.8 Exchange of Information

For Your Reference

Objective: to maintain the security of information and software exchanged within an organization and with any external entities A.10.8.5 Business information systems –Cisco Services

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

143

A.10 Communication and Operations Management (Cont’d)  A.10.9 Electronic Commerce Services Objective: to ensure the security of electronic commerce services, and their secure use

A.10.9.1 Electronic commerce –SSL –VPN

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

144

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

145

A.10 Communication and Operations Management (Cont’d)  A.10.9 Electronic Commerce Services Objective: to ensure the security of electronic commerce services, and their secure use

A.10.9.2 On-Line transactions –SSL and IPSec VPN A.10.9.3 Publicly available information

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

146

A.10 Communication and Operations Management (Cont’d)  A.10.10 Monitoring Objective: to detect unauthorized information processing activities

For Your Reference

A.10.10.1 Audit logging –ACS (accounting part) A.10.10.2 Monitoring system use –Cisco Services DLP Audit –IPS Audit

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

147

A.10 Communication and Operations Management (Cont’d)  A.10.10 Monitoring Objective: to detect unauthorized information processing activities

For Your Reference

A.10.10.3 Protection of log information –SME A.10.10.4 Administrator and operator logs –Enable logging on devices. Use ACS for accounting

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

148

A.10 Communication and Operations Management (Cont’d)  A.10.10 Monitoring Objective: to detect unauthorized information processing activities

A.10.10.5 Fault logging –Cisco Security Manger CSM –CiscoWorks

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

149

A.10 Communication and Operations Management (Cont’d)  A.10.10 Monitoring Objective: to detect unauthorized information processing activities

A.10.10.6 Clock synchronization –Enable NTP on all Cisco devices

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

150

• Synchronize time across all devices • When security event occurs, data must have

consistent timestamps From external time source (Upstream ISP, Internet, GPS, atomic clock) From internal time source Router can act as stratum 1 time source ntp source loopback0 ntp server 10.1.1.1 source loopback0

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

151

• Authenticate NTP messages • NTP access controls http://www.cisco.com/warp/public/707/cisco-sa-20020508-ntpvulnerability.shtml#workarounds

• Disable NTP on interfaces that don’t need it ntp authenticate ntp authentication-key 1 md5 ntp trusted-key 1 ntp access-group {query-only | serve-only | serve | peer} Interface fa0/0 ntp disable

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

152

• A.11.1 Business requirement for access controls

Objective: to control access to information A.11.1.1 Access controls policy – Cisco GRC –Cisco Services (to create policies)

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

153

 A.11.2 User Access Management Objective: to ensure authorized user access and to prevent unauthorized access to information systems.

For Your Reference

A.11.2.1 User registration –Process and Cisco ACS

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

154

 A.11.2 User Access Management Objective: to ensure authorized user access and to prevent unauthorized access to information systems. A.11.2.2 Privilege management – Cisco ACS / ISE –Cisco TrustSec

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

155

Cisco TrustSec is a security solution that provides  Policy-based access control  Identity-aware networking, and  Data integrity and confidentiality services The term TrustSec has been expanded to include several methods for securing network access and control, including:

• • • •

Switch infrastructure solutions Identity-Based Networking Services 802.1X Security Group Tags (SGTs)

Appliance-based solutions:

• Network Admission Control

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

156

Policy-based access control for  Users  Endpoint devices (posture)  Networking infrastructure © 2010 Cisco and/or its affiliates. All rights reserved.

Identity-aware networking  Identity information for granular controls  Role-based business service delivery

Data integrity and confidentiality  Securing data path in the switching environment  IEEE 802.1AE standard encryption Cisco Public

157

Support Contractors, Partners, Guests

Unknown or Guest

Partners

Data Center

Si

Employees

Methods and User, Device Types

Corporate Provide LAN Employee Accountability

Si

Enterprise Network

Meet Corporate Compliance & Regulation

© 2010 Cisco and/or its affiliates. All rights reserved.

Remote Site

EWAN

Wired/Wireless Disparate Access LAN

Subcontractor

Consultant

Mitigate New and Changing Threats

DMZ

Support boundaryless Workforce

Public Internet

Business Partners Cisco Public

158

Common questions organizations ask

Custom er Authorized Access

GuestAccess

Non-Authenticating Devices

 How can I restrict access to my network?

 Can I allow guests Internet-only access?

 Can I manage the risk of using personal PCs?

 How do I easily create a guest account?

 How do I discover non-authenticating devices?

 Common access rights when on-premises, at home, on the road?

 Can this work in wireless and wired?

 Can I determine what they are?

 How do I monitor guest activities?

 Can I control their access?

 Endpoints are healthy?

© 2010 Cisco and/or its affiliates. All rights reserved.

 Are they being spoofed?

Cisco Public

159

NAC Appliances

802.1x/Infrastructure

Vicky Sanchez Employee, Marketing Wireline 3 p.m.

Frank Lee Guest Wireless 9 a.m.

Identity Information Group:

Full-Time Employee

Group:

Contractor

Other Conditions

(Controlling Access)

Time and Date

Broad Access Limited Access Guest/Internet

+

Quarantine

Posture Location

Security Camera G/W Agentless Asset MAC: F5 AB 8B 65 00 D4

Authorization

Deny Access

Group: Francois Didier Consultant HQ—Strategy Remote Access 6 p.m.

© 2010 Cisco and/or its affiliates. All rights reserved.

Guest Device Type

Access Type

Access Compliance Reporting

Cisco Public

160

Provision: Guest accounts via sponsor portal NAC Guest Server

Manage: Sponsor privileges, guest accounts and policies, guest portal Notify: Guests of account details by print, email, or SMS

Report: On all aspects of guest accounts

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

161

Many endpoint devices are undocumented and cannot authenticate to the network

NAC Profiler

Alarm Systems

Device Identification

Control and Audit

IP Cameras

 Determine device type

 Authorize based on device role

Fax Machines

Turnstiles

Cash Registers

HVAC Systems

 Centralized device discovery and inventory  Uses network device tables and analyzes endpoint traffic

 Monitor and audit to prevent spoofing

Video Conference

50% PCs

50% Other

Printers

33% PCs

33% IP Phones 33% Other

Enterprises without VoIP Wired Endpoints Distribution

© 2010 Cisco and/or its affiliates. All rights reserved.

Enterprises with VoIP Wired Endpoints Distribution

Cisco Public

162

Appliance Policy Components

NAC Manager

NAC Server

OR

ACS Identity & 802.1x Access Policy System

Admin, Reporting, Posture, Services, and Policy Store and Enforcement

+

NAC Profiler Profiles NonAuthenticating Devices

NAC Guest Full-Featured Guest Provisioning Server

Endpoint Components (Optional) SSC

NAC Agent

Web Agent

No-Cost Persistent & Temporal Clients for Authentication, Posture, & Remediation

OR

802.1x Supplicant CSSC or OSEmbedded Supplicant

Infrastructure Components (Enforcement)

Cisco 2900/3560/3700/4500/6500 and Nexus 7000 switches, Adaptive Security Appliance (ASA), Wireless and Routing Infrastructure

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

163

For Your Reference  Unique 16 bit (65K) tag assigned to unique role Security Group Tag

 Represents privilege of the source user, device, or entity  Tagged at ingress of TrustSec domain  Filtered (SGACL) at egress of TrustSec domain  No IP address required in ACE (IP address is bound to SGT)

SGACL SG

 Policy (ACL) is distributed from central policy server (ACS) or configured locally on TrustSec device

Benefits  Provides topology-independent policy  Flexible and scalable policy based on user role  Centralized policy management for dynamic policy provisioning  Egress filtering results to reduce TCAM impact

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

164

User

Security Group (Source)

Security Group (Destination)

SGACL S1

MGMT A (SGT 10)

S2

D1 D2 Sales SRV (SGT 500) D3

MGMT B (SGT 20)

S3

S4

HR Rep (SGT 30)

HR SRV (SGT 600)

D4

D5 IT Admins (SGT 40)

© 2010 Cisco and/or its affiliates. All rights reserved.

Servers

Finance SRV (SGT 700)

D6

Cisco Public

165

Cisco’s End-to-End Portfolio Highlights

Campus Access

TrustSec Client

IPT Integration

 Robust Feature Support  Advanced VPN/FIPS  Flexible Profile and Credential Support  Seamless XML Provisioning  NAC Agent  Cisco SSC

 Multi-Domain Auth (MDA)  Monitor Mode, Low-Impact Mode, High Security Mode  CDP Enhancement with for flexible roll out 2nd Port Disconnect  Ease of deployment with (Linkstate awareness) Flexible Auth: One  802.1X - EAP-TLS w/ MIC configuration fits all or LSC  Secure Group Tagging

Business Value © 2010 Cisco and/or its affiliates. All rights reserved.

   

Solution Expertise Reduced Vendor Support Cisco Stability Reduced operational cost

Policy Servers  AAA RADIUS  Cisco ACS 5.1  Wired Guest Access Solution  NAC Guest Server  Profiling  NAC Profiler  Posture  NAC Appliance

Cisco Public

166

 A.11.2 User Access Management Objective: to ensure authorized user access and to prevent unauthorized access to information systems.

For Your Reference

A.11.2.3 User password management –Active Directory (AD), CLI, and ACS/ISE A.11.2.4 Review of user access rights –Active Directory (AD), and ACS/ISE

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

167

• password: sets a password for a line and user EXEC mode • username password: sets a password for a local username • enable password: sets a local password to restrict access

to the various EXEC mode privilege levels. By default, password is stored in clear text • enable secret: sets a local router password for EXEC privilege

levels and stores the password using a nonreversible cryptographic hash function • service password-encryption: encrypts all local passwords including

line, username, enable, and authentication key passwords Useful if an unauthorized user obtains a copy of your configuration file It should be noted that this command invokes the same Type 7 encryption algorithm used by the enable password CLI

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

168

A.11 Access control

For Your Reference

 A.11.3 User Responsibilities Objective: to prevent unauthorized user access, and compromise or theft of information and information processing facilities

A.11.3.1 Password use –Active Directory (AD) A.11.3.2 Unattended user equipment –Screensaver –Network devices timeout A.11.3.3 Clear desk and clear screen policy - Cisco Secure Desktop (CSD)

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

169

A.11 Access control  A.11.4 Network Access Control Objective: to prevent unauthorized access to networked services

A.11.4.1 Policy on use of network services – Cisco ACS /ISE – Cisco NAC /ISE – Cisco ASA –.1x –Cisco TrustSec

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

170

Policy

Services

NAC Manager Centralized management, configuration, reporting, and policy store

Ruleset Updates Scheduled automatic rulesets for anti-virus, Microsoft hot-fixes and other applications

NAC Server

NAC Guest

Posture, services and enforcement

Full-featured guest provisioning server

ACS

RADIUS-based access policy for 802.1X termination

NAC Profiler

NAC Collector

Aggregates data from Collector to determine role and privileges

Collects network data to determine device type

NADs ASA VPN

Endpoints

Wireless

NAC Agent or Web Agent No-cost client for devicebased scans.

© 2010 Cisco and/or its affiliates. All rights reserved.

Switch

802.1X Supplicant 802.1X supplicant via CSSC or native OS

Cisco Public

171

Identity + Posture

NAC Manager

NAC Server

NAC Agent

RBAC, Device Compliance, Threat Containment

Guest Lifecycle Management

Increased Productivity, Operational Efficiency

NAC Guest Server

Device Profiling & Provisioning + Behavior Monitoring NAC Profiler Inventory Management, Operation Efficiency

© 2010 Cisco and/or its affiliates. All rights reserved.

NAC Collector Standalone appliance or licensed as a module on NAC Server

Cisco Public

172

Simplifies Management for AV and AS Applications Cisco NAC Manager

© 2010 Cisco and/or its affiliates. All rights reserved.

AutoUpdates Hotfixes Service Packs Windows Updates

Cisco Public

173

A.11 Access control  A.11.4 Network Access Control Objective: to prevent unauthorized access to networked services

For Your Reference

A.11.4.2 User authentication for external connections – Cisco VPN Solutions – Cisco ACS/ISE – Cisco ASA – Cisco IOS firewall on the ISR

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

174

A.11 Access control  A.11.4 Network Access Control Objective: to prevent unauthorized access to networked services

For Your Reference

A.11.4.3 Equipment identification in network – Cisco NAC profiler /ISE –Cisco TrustSec (Device Access Control) –Cisco CleanAir for Wireless –SNMP

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

175

Integrated spectrum intelligence  Detects, classifies, locates and mitigates RF interference  Self-heals and optimizes wireless performance  Purpose-built radio chipset for spectrum intelligence, not software based  Cisco Aironet 3500 Series Access Points  Secures against non Wi-Fi threats and enforces policy automatically

“This capability has been at the top of my wish list for spectral-assurance tools since... The potential benefits in performance, reliability, security, integrity, and risk management (regulatory and related) are enormous.”

– Craig Mathias, Farpoint Group

© 2010 Cisco and/or its affiliates. All rights reserved.

“The integration of spectrum analysis and building this intelligence into the infrastructure itself is a significant game changer… A selfhealing WLAN able to work around the various sources of interference is fast becoming a requirement…”

– Mike Brandenburg, Network Computing

Cisco Public

176

176

For Your Reference

• Canonical method of obtaining real time information from

network devices • SNMP Version 3 (SNMPv3) provides authentication, encryption • MIBs support polling of statistics ranging from interface bandwidth to CPU

utilization to chassis temperature • Both a pull model for statistical polling and a push model for trap generation

based on events such as link up/down • Many open-source and commercial collection systems, visualization tools • Easiest way to get into profiling of general network characteristics

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

177

For Your Reference

• Network Management Systems (NMS) can serve as SNMP consoles,

among other things • Many NMS can use SNMP traps and/or other forms of telemetry as triggers

for paging, scripted actions, etc. • Pulling information together can be useful for Network Operations Centers,

operations teams • Commercial systems such as HP OpenView, Micromuse NetCool, IBM

Tivoli, CA Unicenter • Several open source systems—Big Brother (http://bb4.com/ ), Big Sister

(http://www.bigsister.ch/ ), Nagios (http://www.nagios.org/ ), and others

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

178

A.11 Access control  A.11.4 Network Access Control Objective: to prevent unauthorized access to networked services

For Your Reference

A.11.4.4 Remote diagnostic and configuration port protection – CiscoWorks – ACL – Cisco ACS /ISE –Cisco Physical Security (Access Control, Cameras, Video surveillance)

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

179

A.11 Access control  A.11.4 Network Access Control Objective: to prevent unauthorized access to networked services

For Your Reference

A.11.4.5 Segregation in networks –VLANs –DMZ –MPLS – Cisco ASA and virtual firewalls – Cisco Nexus and virtualization portfolio – VSG (Virtual Security Gateway)

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

180

A.11 Access control  A.11.4 Network Access Control Objective: to prevent unauthorized access to networked services

For Your Reference

A.11.4.6 Network connection controls – Cisco ASA – Cisco ACS /ISE – Cisco VPN solutions

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

181

A.11 Access control  A.11.4 Network Access Control Objective: to prevent unauthorized access to networked services

A.11.4.7 Network routing control – Cisco ASA – Cisco ISR – ACL from routing point of view, routing authentication

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

182

Configure Routing Authentication

Campus Signs Route Updates

Verifies Signature Signature

Route Updates

Certifies Authenticity of Neighbor and Integrity of Route Updates

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

183

• A variety of Cisco IOS protocols support MD5 authentication

including BGP, OSPF, LDP, RIPv2, IS-IS, HSRP, EIGRP, and MSDP Configured Shared Key = X

Configured Shared Key = X If MAC1 = MAC2, Then Routing Advertisement Authenticated. Else Routing Advertisement Discarded.

MAC1 + Routing Advertisement 2 Routing Advertisement + Shared Key

Routing Advertisement + Shared Key

MD5 Hash

MD5 Hash

MAC1 1

© 2010 Cisco and/or its affiliates. All rights reserved.

4

MAC1 3

Cisco Public

184

• CLI command that automates the configuration of security features and

disables certain features enabled by default that could be exploited for security holes Router#auto secure [management | forwarding] [no-interact | full] [ntp | login | ssh | firewall | tcp-intercept]

• Implements a number of best practices to help secure the router • Released in Cisco IOS Software

Releases12.3(1) mainline, 12.3T, and 12.2(18)S http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6642/pr od_white_paper09186a00801dbf61.html

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

185

Auto Secure Options • Management–Secures only Management Plane • Forwarding–Secure only Forwarding Plane • No-interact–No interactive configurations • Full–Full interactive session (Default) • NTP–Secures only NTP • Login–Secures only Device login • SSH–Enables SSH • Firewall–Enables Cisco IOS Firewall • TCP-intercept–Enables tcp-intercept

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

186

 A.11.5 Operating system access control Objective: to prevent unauthorized access to operating systems

A.11.5.1 Secure log-on procedures ACS and AD, single sign on (SSO), router access tools A.11.5.2 User identification and authentication –ACS and AD, single sign on (SSO), router access tools, –Access Control on ASA firewall –Appilcation access control on ASA firewall

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

187

• Console and VTY • SSH—encrypted access • Telnet (prefer SSH) • Local passwords Usernames configured on the router with MD5 passwords • External AAA TACACS+, RADIUS, Kerberos • One-time passwords (OTP) • HTTP/HTTPS • SNMP

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

188

• Differentiate staff authority on the router Help desk Operations Second-level/third-level support • Use privilege levels (0–15)

System Administrator

Network Engineer

Level 2: show, debug, ping

Level 15: All Commands

Router

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

189

• Set level of privilege for each user class privilege exec level 5 show ip route privilege exec level 5 configure terminal privilege exec level 5 show version privilege configure level 5 interface privilege interface level 5 shutdown

• Initially difficult to deploy • Long-term benefit outweighs short-term pain

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

190

Comprehensive, Granular Controls

Management and Operations

Access Control

Protocol Inspection

Threat Protection

Secure Connectivity

Secure Unified Communications

Adaptive Security Appliance Platform  Flexible, granular controls  Application and user-centric security  Acceptable use management

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

191

Application and User-Centric Security for ASA Access Control for Modern Networks

Application Access Control

Authentication Policies

 Integrated HTTP & Port 80

 Selective access to assets

 IM & P2P

 Track and audit user activity

 Content type & Active-X

 Extensive protocol support

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

192

 A.11.5 Operating system access control Objective: to prevent unauthorized access to operating systems

A.11.5.3 Password management system – Cisco ACS (and AD) A.11.5.4 Use of system utilities – Cisco ACS (authentication and authorization) –IBM Tivoli and HP OpenView

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

193

 A.11.5 Operating system access control Objective: to prevent unauthorized access to operating systems

A.11.5.5 Session time-out –IOS timeout features, VPN timeout, etc A.11.5.6 Limitation of connection time –IOS commands timeout: ssh, telnet, etc

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

194

• To mitigate the risk associated with idle user sessions: exec-timeout: disconnects incoming user sessions after a specific period of idle time ip http timeout-policy idle: disconnects idle HTTP (or HTTPS) client connections after a specific period of idle time • To verify whether a remote host associated with a previously

connected TCP session is still active and reachable: service tcp-keepalives-in: to generate keepalive packets on inactive incoming network connections (initiated by the remote host) service tcp-keepalives-out: to generate keepalive packets on inactive outgoing network connections (initiated by a local user)

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

195

A.11 Access control

For Your Reference

• A.11.6 Application and information access control

Objective: to prevent unauthorized access to information held in application systems A.11.6.1 Information access restriction – Cisco TrustSec –Cisco NAC –ACLs –DAP (Dynamic Access Policy) – Cisco SSL VPN – Cisco IPS – Cisco ACS A.11.6.2 Sensitive system isolation –Zoning, VLANs, Virtualization, MPLS VRF, VMWare, VSG

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

196

 A.11.7 Mobile Computing and Teleworking Objective: to ensure information security when using mobile computing and teleworking facilities A.11.7.1 Mobile computing and communications – Cisco AnyConnect – Cisco VPN SSL – Cisco VPN IPSec

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

197

Web Security with Next Generation Remote Access Choice Diverse Endpoint Support for Greater Flexibility

 

Data Loss Prevention

Acceptable Use

Threat Prevention

Access Control

Security Rich, Granular Security Integrated Into the network

Experience

Access Granted Intranet Corporate File Sharing © 2010 Cisco and/or its affiliates. All rights reserved.

 

Always-on Intelligent Connection for Seamless Experience and Performance Cisco Public

198

Secure Network Access

Cisco AnyConnect Essentials       

Automatically downloadable Access to almost any application or resource Automatic updates Robust, easy connections Optimized for mobile users IPv4 and IPv6 network access Voice friendly (DTLS)

Cisco AnyConnect Premium Enhances AnyConnect Essentials features  



Clientless SSL support Cisco Secure Desktop Vault for secure access from unmanaged endpoints Cisco Secure Desktop Host Scan for pre-connect posture checks 199

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

199

Tunneling (Microsoft Windows Mobile) 

Microsoft Windows Mobile 6.1, 6.0, and 5.0



Touch-screen devices



Secure remote access to enterprise applications from Microsoft Windows Mobile

© 2010 Cisco and/or its affiliates. All rights reserved.

For Your Reference

Cisco Public

200

200

Tunneling (Apple iPhone) 

Apple iPhone and iPod touch compatible



Secure remote access to enterprise applications



IPsec VPN tunneling



No unique configuration required on headend side

© 2010 Cisco and/or its affiliates. All rights reserved.

For Your Reference

Cisco Public

201

201

A Next Generation Solution 1

AnyConnect

2

Secure Mobility Client

Web Security Appliance Richer Web Controls

 Simplified remote access

 Location-aware policy

 Connection and app persistence

 Application controls

 Always-on VPN enforcement

 SaaS Access Control

Combined Solution End-to-End Seamless Security Information Sharing Between Cisco ASA and Cisco WSA

AnyConnect

ASA

News

Email

Cisco Web Security Appliance

Corporate AD Social Networking © 2010 Cisco and/or its affiliates. All rights reserved.

Enterprise SaaS Cisco Public

202

• More Intelligence Optimal Gateway Detection Trusted Network Detection • More Security Always-On VPN administrative control Quarantine capability • Better User Experience Hotspot/Captive Portal detection Local print access

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

203

SAML enabled gateway

Internal Users

AD / User Dir

SAML

Remote Users

Enterprise Edge

• Usability: Sign into SaaS applications using same AD credentials • Security: Zero-day revocation of SaaS permissions • Simplicity: Integrated SAML Identity Provider © 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

204

A.11 Access control  A.11.7 Mobile Computing and Teleworking Objective: to ensure information security when using mobile computing and teleworking facilities

A.11.7.2 Teleworking –Cisco AnyConnect –CVO (Cisco virtual office) –VPN (SSL, IPSec) – Cisco NAC /ISE

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

205

 Single phone line  Single wireless network  Same secure application and resource access

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

206

Unified Communications

Security

Mobility

© 2010 Cisco and/or its affiliates. All rights reserved.

Management

Cisco Public

207

For Your Reference

Remote Site

© 2010 Cisco and/or its affiliates. All rights reserved.

Head-End Site

Cisco 800 Series Secure Wireless Integrated Router

Cisco Secure Router with VPN

Cisco Unified Phone 7900 Series

Configuration Engine for Touch Free Deployment

Cisco Public

208

For Your Reference

Cisco Virtual Office (larger deployments) Full featured management infrastructure includes services for policy definition, identity, and automated configuration push

Cisco Virtual Office Express Simplified single device head-end infrastructure for fastest setup and deployment

ISR/7206: Head-End VPN

Cisco ASR: Head-End VPN

Corporate Campus

Corporate Campus

Cisco Security Manager, ACS, Configuration Engine, and SDP Server

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Configuration Engine (optional)

AAA (ACS optional)

Cisco Public

209

Cisco Virtual Office Use Cases HOME OFFICE

 Part/Full-Time Telecommuter

SMALL BRANCH

 Fixed Location

CALL CENTER

 Fixed or home office

MOBILE USER

 Fixed or home office

For Your Reference

 Shared Connection

 More Than One User

 Convenient Services

 Convenient Services

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

210

For Your Reference

• Seamless experience Office vs. Home with CVO • Additional support for content-rich applications (Web 2.0) • Comprehensive QoS for optimal voice and video • Available Unified Wireless • Layered Security supported: PKI, Firewall, IPS, NAC, port-security

802.1x, and Content Filtering

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

211

For Your Reference

The Virtual Office Solution for Teleworkers Mobile User

Extend Trusted Network to Home and Branch Offices with CVO and ISR

AnyConnect

CVO/ISR

AnyConnect Secure Mobility Client

Cellular

Public Internet Wi-Fi Wired

Purpose-Optimized Head Ends: ASA and IOS VPN

Corporate Network

ASA IOS VPN

CVO = Cisco Virtual Office Applications and Data

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

212

For Your Reference

• A.12.1 Security requirements of information systems

Objective: to ensure that security is an integral part of information systems A.12.1.1 Security requirements analysis and specification –Cisco Services

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

213

A.12 Information Systems Acquisition, Development and Maintenance  A.12.2 Correct processing in applications Objective: to prevent errors, loss, unauthorized modification or misuse of information in applications

A.12.2.1 Input data validation –Cisco IPS – Cisco ASA application inspection

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

214

Protocol Depth and Breadth

HTTP

Instant Messaging/ P2P

SIP/H.323/ SCCP

© 2010 Cisco and/or its affiliates. All rights reserved.

 Do not allow credit card numbers in the clear.  Impose maximum URL length

 Block Kazaa P2P  Do not allow IM file transfer or whiteboard.

 Prevent Gaming applications embedded in SIP

Cisco Public

215

Protocol Depth and Breadth

DNS

 Enforce legitimate zone transfers, private versus public domains  DNS spoofing and cache poisoning prevention

SMTP/ ESMTP

 Block *.exe attachments.  E-mail only to or from my domain.

FTP

 Prevent tree traversal  Allow limited set of verbs

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

216

 A.12.2 Correct processing in applications Objective: to prevent errors, loss, unauthorized modification or misuse of information in applications

A.12.2.2 Control of internal processing A.12.2.3 Message integrity –VPN - MACing (Message Authentication Code ) – hashing –ESA email encryption

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

217

Easy for the Sender…

CISCO REGISTERED ENVELOPE SERVICE

• Automated key management • No desktop software requirements • Send to any email address seamlessly

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

218

Easy for the Recipient... 1. Open Attachment

2. Enter password

3. View message

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

219

 A.12.2 Correct processing in applications Objective: to prevent errors, loss, unauthorized modification or misuse of information in applications

For Your Reference

A.12.2.4 Output data validation –MACing

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

220

 A.12.3 Cryptographic controls Objective: to protect confidentiality, authenticity, or integrity of information by cryptographic means. A.12.3.1 Policy on the use of cryptographic controls –VPN (SSL, IPSec, DMVPN, GET VPN) –ISR G2 –ASA –Secure Wireless –IP Communication (video, audio, broadcast) - encrypted voice and control signaling (ASA) – Cisco TrustSec 802.1 AE-based Encryption for date integrity and confidenitality (MacSec)

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

221

• Provides strong 128-bit AES-GCM* encryption (NIST** Approved) • Line-rate encryption / decryption • Standards-based key management: IEEE802.1X-REV 802.1AE

Benefits • Protects against man-in-the-middle attacks (snooping, tampering,

replay) • Network service amenable to hop-by-hop approach compared to

end-to-end approach (e.g., IPsec enforcement)

* NIST Special Publication 800-38D (http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf) * Galois/Counter Mode

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

222

Next-Generation Security Clear Data and Video Streams in LAN

Encrypted, Tamper-Proof Transactions

D

D

D

D

D

D

D

D

D

D

D

D

D

D

D

D

D

D

V

V

V

V

V

V

V

V

V

V

V

V

V

V

V

V

V

V

Malicious Guest User Is My Network Ready for Current and Future Regulatory Requirements? © 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

223

User: steve User: bobencryption Policy: Policy: encryption Campus Network

Wiring Closet Switch

NonMACSec enabled

AAA

1

User bob connects.

2

Bob’s policy indicates endpoint must encrypt.

3

Key exchange using MKA, 802.1AE encryption complete. User is placed in corporate VLAN. Session is secured.

802.1X-Rev Components

4

User steve connects

• AAA server 802.1X-Rev aware

5

Steve’s policy indicates endpoint must encrypt.

6

Endpoint is not MACSec enabled. Assigned to guest VLAN.

• Supplicant supporting MKA and 802.1AE encryption

© 2010 Cisco and/or its affiliates. All rights reserved.

• MACSec enabled switches

Cisco Public

224

For Your Reference

• Standards-based encryption on user ports (IEEE 802.1AE) Announcing on new Cat 3K first

• MacSec Key Agreement (MKA) standards-based key exchange protocol

(IEEE 802.1X-REV MACSec Key Agreement) • Some newer Intel LOM chip sets support MacSec • MACSec-ready hardware: Intel 82576 Gigabit Ethernet Controller Intel 82599 10 Gigabit Ethernet Controller Intel ICH10 - Q45 Express Chipset (1Gbe LOM) (Dell, Lenova, Fujitsu, and HP have desktops shipping with this LOM.)

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

225

For Your Reference

Data Center A

Data Center B EoMPLS Capable Device

N7K-1

N7K-3 ASR-1

EoMPLS Psuedowires

vPC

N7K-2

ASR-3

ASR-2

vPC

ASR-4

N7K-4

EoMPLS Capable Device

802.1AE Frame

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

226

Cisco Wireless Security Overview Integrated

Built into the wireless infrastructure WIPS

Auth/Privacy

Proactive

Collaborative

Hardened wireless core to prevent attacks before they happen

Wired and wireless network security working together

Access Control Infrastructure Authentication

Clean RF

Management & Reporting

MFP

Automated Vulnerability Monitoring

Malware Mitigation

Posture Assessment

Unified Security Management

Unified Wireless Network WLAN Controllers

Access Points

WCS

RF Intelligence

Mobility Services

Cisco Borderless Network Architecture

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

227

Cisco ASA Phone Proxy Remote Access and Voice/Data Segmentation Trusted (Un-secured)

Un-trusted

Unencrypted/encrypted

Encrypted (TLS/SRTP)

Internet

Cisco IP phone (remote)

Cisco IP Phone



Leverage native Cisco IP Phone encryption (TLS/SRTP) to enable secure calls from IP Phones on un-trusted, remote networks



Seamless deployment and operation with minimal impact on existing UC infrastructure



Simplified user experience – Plug and play



A Remote Access UC Solution for UC devices © 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

228

Industry-First Encrypted Voice Security Solution New in 8.0!

TLS signaling

Encrypted Endpoint

SRTP media Encrypted Endpoint

Any Cisco voice/video communications encrypted with SRTP/TLS can now be inspected by Cisco ASA 5500 Adaptive Security Appliances: 

Maintains integrity and confidentiality of call while enforcing security policy through advanced SIP/SCCP firewall services



TLS signaling is terminated and inspected, then re-encrypted for connection to destination (leveraging integrated hardware encryption services for scalable performance)



Dynamic port is opened for SRTP encrypted media stream, and automatically closed when call ends © 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

229

Data Center

Internet Edge

GM

IPsec

IPsec

GM

KS

KS WAN Edge

Remote Access

EzVPN Spoke

Internet/ Shared Network

DMVPN Spoke

© 2010 Cisco and/or its affiliates. All rights reserved.

DMVPN Spoke

MPLS/Private Network

GET GM

GET GM

GET GM

Cisco Public

230

 A.12.3 Cryptographic controls Objective: to protect confidentiality, authenticity, or integrity of information by cryptographic means. A.12.3.2 Key management

–GET VPN –Key server management –Certificate Authority

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

231

Key Server • Validate Group Members • Manage Security Policy • Create Group Keys • Distribute Policy / Keys

Key Server

Routing Member • Forwarding • Replication • Routing

Group Member Routing Members Group Member

Group Member • Encryption Devices • Route Between Secure / Unsecure Regions • Multicast Participation © 2010 Cisco and/or its affiliates. All rights reserved.

Group Member Group Member

Cisco Public

232

For Your Reference

Key Encryption Key (KEK)

Group Policy

Key Server

Traffic Encryption Key (TEK) Group Member Routing Members Group Member

RFC3547: Group Domain of Interpretation (GDOI) © 2010 Cisco and/or its affiliates. All rights reserved.

Group Member Group Member

Cisco Public

233

For Your Reference

• Step 1: Group Members (GM)

“register” via GDOI with the Key Server (KS) KS authenticates & authorizes the GM KS returns a set of IPsec SAs for the GM to use

GM3

GM4

GM2 GM5 GM1 GM6 GM9

KS GM8

© 2010 Cisco and/or its affiliates. All rights reserved.

GM7

Cisco Public

234

For Your Reference

• Step 2: Data Plane Encryption GM exchange encrypted traffic using the group keys The traffic uses IPSec Tunnel Mode with “address preservation” GM3

GM4

GM2 GM5 GM1 GM6 GM9

KS GM8

© 2010 Cisco and/or its affiliates. All rights reserved.

GM7

Cisco Public

235

For Your Reference

• Step 3: Periodic Rekey of Keys KS pushes out replacement IPsec keys before current IPsec keys expire. This is called a “rekey”

GM3

GM4

GM2 GM5 GM1 GM6 GM9

KS GM8

© 2010 Cisco and/or its affiliates. All rights reserved.

GM7

Cisco Public

236

 A.12.4 Security of system files Objective: to ensure the security of system files

For Your Reference

A.12.4.1 Control of operational software –IPT phone image control A.12.4.2 Protection of system test data A.12.4.3 Access control to program source code –IronPort

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

237

For Your Reference

 A.12.5 Security in Development and Support Processes Objective: to maintain the security of application system software and information

A.12.5.1 Change controls procedures A.12.5.2 Technical review of applications after operating system changes A.12.5.3 Restrictions on changes to software packages A.12.5.4 Information leakage – DLP on ESA and WSA (IronPort) – DLP on Cisco AnyConnect A.12.5.5 Outsourced software development –Cisco Services

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

238

For Your Reference

 A.12.6 Technical Vulnerability Management Objective: to reduce risks resulting from exploitation of published technical vulnerabilities.

A.12.6.1 Control of technical vulnerabilities –Cisco Security Manager (CSM) / Cisco Prime –Cisco SPA service –Qualys –Red Seal

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

239

For Your Reference

• A.13.1 Reporting Information Security Events and Weaknesses

Objective: to ensure information security events and weaknesses associated with information systems are communicated in a manner allowing timely corrective action to be taken A.13.1.1 Reporting information security events –CSM / Prime – Cisco IPS A.13.1.2 Reporting security weaknesses –Cisco Advanced Services (Pen Test and Vulnerability Assessment) –Qualys –RedSeal

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

240

 A.13.2 Management of Information Security Incidents and Improvement Objective: to ensure a consistent and effective approach is applied to the management of information security incidents

A.13.2.1 Responsibilities and procedures A.13.2.2 Learning from information security incidents A.13.2.3 Collection of evidence –Netflow - Routers (ISR), Switches, and other Cisco devices – Cisco ASA (logs) – Cisco IPS – Cisco ACS (AAA)

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

241

• Packet capture is like a wiretap • NetFlow is like a phone bill • This level of granularity allows NetFlow to

scale for very large amounts of traffic We can learn a lot from studying the phone bill! Who’s talking to whom, over what protocols and ports, for how long, at what speed, for what duration, etc. NetFlow is a form of telemetry pushed from the routers/switches — each one can be a sensor

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

242

Internal Threat Information Resource router (config-if)# ip flow ingress router (config)# ip flow-export destination 172.17.246.225 9996 • NetFlow is available on routers and switches • Have syslog-like information without having to buy a firewall • One NetFlow packet has information about multiple flows

Header • Sequence number • Record count • Version number

Flow Record



Flow Record

NetFlow Cache

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

243

Internal Threat Information Resource

Traffic classification Flow Summary

Detail

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

244

• Networks and network enabled devices

constantly create traffic. However, this traffic follows certain patterns according to the applications and user behaviour • Analyzing these patterns allows us to see

what is NOT normal • The key is to collect traffic information

(Netflow) and calculate various statistics. These are then compared against a baseline and abnormalities are then analyzed in more detail.

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

245

• Cisco NetFlow home

For Your Reference

http://www.cisco.com/en/US/tech/tk812/tsd_technology_support_protoco l_home.html • Linux NetFlow reports HOWTO http://www.dynamicnetworks.us/netflow/netflow-howto.html

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

246

For Your Reference

• A.14.1 Information Security Aspects of Business Continuity Management

Objective: to counteract interruptions to business activities and to protect critical business processes from the effect of major failure of information systems or disasters and to ensure their timely resumption A.14.1.1 Including information security in the business continuity management process A.14.1.2 Business continuity and risk assessment A.14.1.3 Developing and implementing continuity plans including information security – Cisco Virtual Switching System (VSS ) – High Availability and Failover features on all systems –Hot swappable power supplies

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

247

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

248

For Your Reference

• A.14.1 Information Security Aspects of Business Continuity Management

Objective: to counteract interruptions to business activities and to protect critical business processes from the effect of major failure of information systems or disasters and to ensure their timely resumption A.14.1.4 Business continuity planning framework A.14.1.5 Testing, maintaining and re-assessing business continuity plans – Cisco Services

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

249

• A.15.1 Compliance with legal requirements

Objective: to avoid breaches of any law, statutory, regulatory or contractual obligations, and of any security requirements A.15.1.2 Identification of applicable legislation – Cisco GRC Service A.15.1.2 Intellectual property rights –Intellectual Property DLP email ESA A.15.1.3 Protection of organizational records –DLP, HA storage, VPN -integrity, SME A.15.1.4 Data protection and privacy of personal information –Refer to Cisco solution for PCI Compliance

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

250

Email Remains a Primary Loss Vector

Record Type Lost Credit Card Numbers 45%

Other 12%

Email Address 13%

Social Security Numbers 30%

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

251

Simple Set Up • Easy “3 click” set-up using

content filters • Use pre-defined content

categories or create / customize your own • Can be applied to specific

users under specific conditions

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

252

Integrated Scanning

Custom Content Filters

Compliance Dictionaries

Users Outbound Mail

Smart Identifiers

Weighted Content Dictionaries Attachment Scanning

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

253

Integrated Remediation

Remediation: Notification

Users Outbound Mail

Encrypt the Message

Remediation: Quarantine

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

254

• Business Needs determine sensitive content • Content can be tracked on key words Exchange.charlie.com 172.20.0.10 Internet

If Body or Attachment contains "Confidential" Then Quarantine Policy Quarantine

Human Resources

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

255

• A.15.1 Compliance with legal requirements

Objective: to avoid breaches of any law, statutory, regulatory or contractual obligations, and of any security requirements A.15.1.5 Prevention of misuse of information processing facilities – Cisco Physical security – System Banners

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

256

• A banner serves as a legal notice, such as

“no trespassing” or a “warning” statement. A proper legal notice protects you such that it enables you to pursue legal actions against unauthorized users. • EXEC banner: specifies a message (or EXEC banner) to be

displayed when an EXEC process is created • MOTD banner (message-of-the-day): specifies a MOTD to be

displayed immediately to all user sessions and when new users first connect to the router • Incoming banner: specifies an incoming banner to be displayed

for incoming reverse Telnet sessions • Login banner: specifies a login banner to be displayed before

username and password prompts

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

257

For Your Reference

banner login ^ Authorised access only This system is the property of Galactic Internet Disconnect IMMEDIATELY if you are not an authorised user! Contact [email protected] 555-1212 for help. ^ banner motd ^ Notice: all routers in $(domain) will be upgraded beginning July 1 ^ banner exec ^ PLEASE NOTE - THIS ROUTER SHOULD NOT HAVE A DEFAULT ROUTE! It is used to connect paying peers. These ‘customers’ should not be able to default to us. The config for this router is NON-STANDARD Contact Network Engineering 555-1212 for more info. ^

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

258

For Your Reference

• A.15.1 Compliance with legal requirements

Objective: to avoid breaches of any law, statutory, regulatory or contractual obligations, and of any security requirements A.15.1.6 Regulation of cryptographic controls – Export license for K9 – Written Assurance

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

259

For Your Reference

 A.15.2 Compliance with Security Policies and Procedures, and Technical Compliance Objective: to ensure compliance of systems with organizational security policies and standards.

A.15.2.1 Compliance with security policies and procedures A.15.2.2 Technical compliance checking –Security assessment tools

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

260

For Your Reference

 A.15.3 Information Systems Audit Considerations Objective: to maximize the effectiveness of and to minimize interferences to/from the information systems audit process

A.15.3.1 Information system audit controls A.15.3.2 Protection of information system audit tools

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

261

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

262

How Best to Implement Frameworks  The best practices adopted must consider the following:

Tailoring Aligning Best Practices with Business Align IT strategy with business goals Understand, define, and mitigate risks

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

263

How Best to Implement Frameworks  Planning

Set up an organizational framework with clear responsibilities and objectives and participation from all interested parties Manage risk areas Analyze current capability and identify gaps Develop a maturity capability assessment Measure results, establish a scorecard mechanism for measuring current performance and monitor the results of new improvements

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

264

How Best to Implement Frameworks  Open and Strong Support by Senior Management

Ideally, the top senior management should take ownership of IT governance Continuous communication with senior management Alignment of IT initiatives with business needs & risks Performance measurement and reporting

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

265

How Best to Implement Frameworks  General Recommendations

For Your Reference

Treat the implementation initiative as a project with phases Create awareness of the business purpose and benefits of practices Cultural Change Manage expectations Focus on quick wins Framework, processes and procedures should be agile and flexible, to adapt to changes (new technologies, Org change, new demands, etc.)

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

266

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

267

New Trends Change the Face of the Data Center

Cloud Private and Public; Elasticity & Scale

Virtualization Consolidation; Optimization; Agility

Openness Secure Access for Mobile Users, Partners, Outsourcers

Scale and Simplicity Capacity and Operations Scaling with the Business

2000 © 2010 Cisco and/or its affiliates. All rights reserved.

2005

2010

2015 Cisco Public

268

Request a Resource

Resource Pool

Pay as You Use Capacity

Suitability

Performance

Normalization

Need It – Get It Instantly Don’t Need it – Give It Back

© 2010 Cisco and/or its affiliates. All rights reserved.

Green

Cisco Public

269

IT Resources and Services that Are Abstracted from the Underlying Infrastructure and Provided “On Demand” and “At Scale” in a Multitenant and Elastic Environment A Style of Computing Where Massively Scalable IT-Enabled Capabilities Are Delivered “As a Service” to Multiple External Customers Using Internet Technologies Source: Gartner “Defining and Describing an Emerging Phenomenon” June 2008

© 2010 Cisco and/or its affiliates. All rights reserved.

Anywhere, Anyone, Any Service

Cisco Public

270

A New Utility Water Electricity

Cloud Computing Is a 4th Utility Virtualization (lower cost) Low Complexity Scalability Elasticity (economies of scale)

Phone

Utility Computing and Cloud Computing Are Often Confused:  Utility computing delivers a “pay-by-the-drink” business model in which customers receive computing resources from a service provider.  Cloud computing relates to the way we design, build, deploy, and run applications in a virtualized environment, share resources, and dynamically grow.

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

271

Physical Access Switch

© 2010 Cisco and/or its affiliates. All rights reserved.

Integrated Nexus 1000V Virtual Switch

Cisco Public

272

• Includes Key Cisco Network

and Security features • Addressing Issues for: VM Isolation Separation of Duties VM Visibility

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

273

• Toll fraud Unauthorized or unbillable resource utilization

• Eavesdropping Listening to another’s call

• Learning private information caller ID, DTMF password/accounts, calling patterns

• Session replay Replay a session, such as a bank transaction

© 2010 Cisco and/or its affiliates. All rights reserved.

• Fake identity • Media tampering • Denial of service Hanging up other people’s conversations Contributing to other DOS attacks

• Impersonating others • Hijacking calls • SPAM SPIM, SPIT, and more SPAM

Cisco Public

274

Building A Secure UC System Protecting all elements of the UC system

For Your Reference

Infrastructure

Endpoints

Secure connectivity and transport

Authenticated IP phones, soft clients and other devices Unified Communications

Call Control

Applications

Secure Protocols for Call Management Features

Auto-attendant, Messaging, and Customer Care

© 2010 Cisco and/or its affiliates. All rights reserved.

Network as the Platform

Cisco Public

275

For Your Reference

Systems Approach in Action Infrastructure

Applications

      

 Multi-level administration

VLAN segmentation Layer 2 protection Firewall Intrusion detection QoS and thresholds Secure VPN Wireless security

Internet

Intranet

 Digital certificates  Signed software images  TLS signaling  Integrated CSA

© 2010 Cisco and/or its affiliates. All rights reserved.

 Secure management  Hardened platforms  h.323 and SIP signaling

Call Management  Hardened Windows OS

 Toll fraud protection

Endpoints Si

Si

 Digital certificates  Authenticated phones  GARP protection  TLS protected signaling  SRTP media encryption  Centralized management

Cisco Public

276

For Your Reference

Application Inspection and Control in ASA • Application and protocol-aware inspection services provides strong

application-layer security • Performs conformance checking, state tracking, security checks,

NAT/PAT support, and dynamic port allocation

H.323

MGCP

RTSP

SCCP

SIP

TAPI/JTAPI

NAT/PAT

NAT/PAT

NAT/PAT

NAT/PAT

NAT/PAT

NAT/PAT

Ver. 1–4

v0.1/v1.0

TCP

TCP

UDP/TCP

TCP

Fragmentation and Segmentation Support

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

277

Mobile voice and collaboration  Delivers high quality voice services over the wireless LAN  CCX enabled with intelligent QoS, fast secure roaming, and enhanced power management  Supported on single or dual mode Wi-Fi and CCX enabled phones  Cisco Aironet 1140, 1250, 1260 and 3500 Series Access Points  Reduces cell phone costs and supports dual-mode applications like Cisco Mobile 8.0 for iPhone and Cisco Nokia Call Connect “This emphasis on mobility is taking Wireless LAN technology from being a convenience to an essential part of the business environment. Cisco is describing a vision that combines WLAN voice, fixed mobile convergence, and mobile unified communications to provide the core elements for developing wireless communications-enabled business processes.”

“One of the biggest immediate benefits is for customers seeking to enable their end users to make voice calls over Wi-Fi networks and then roam on to cellular networks without losing their calls, a capability that can improve the user experience while greatly lowering calling costs.”

– Michael Finneran, dBrn Associates

– Matt Hamblen, Computerworld

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

278

278

Mobile Devices

↔ IT Resources 1.3 Billion New Networked Mobile Devices in Next 3 Years

© 2010 Cisco and/or its affiliates. All rights reserved.

Mobility

Video

60% of All Cisco Network Traffic Today Is Video

Cisco Public

279

CIO Priorities

Changing Business Demographics

Over the Next 3 Years

 Acquire and retain customers

 17% branch growth by 2010

 IT staff : 1.1X

 Manage customer relationships

 Centralized data, distributed interactions

 Mobile users: 3X

Lower company operating costs

 By 2012–90% of consumer traffic will be video –Nemertes, Cisco VNI, 2009

–Forrester, 2008

© 2010 Cisco and/or its affiliates. All rights reserved.

 Servers: 1.8X  Information: 4.5X  User interactions per day: 8.4X –IDC, 2009

Cisco Public

280

Video done right  Extends Offers new features plus architectural alternatives theintelligent boundaryrouting of networks to include the endpoints to scale, to guard against the risk of quality degradation due to network congestion optimize and enhance the performance of video.  Simplifies Reserves resources across entirethe network in order to assure a of deployments and the reduces ongoing operational costs predictable and controlled of Experience for each rich media rich media applications andQuality end points. session  Offers intelligent routing features plus architectural alternatives to  guard Reduces trafficthe to risk the Cisco WebEx cloud, optimizing the branch against of quality degradation due to network experience congestion Performance Routing automatically via the  Reduces traffic to the Cisco WebEx routes cloud, media optimizing theoptimal branch route as configured by the customer experience

“Video Stream is a great step in the right direction…and it’s only a matter of time before video becomes our primary form of communication. Cisco's strategy seems to be to drive the business by providing customers with high-bandwidth/video applications. Not a bad thing at all.” – – Craig Craig Mathias, Mathias, Farpoint Farpoint Group Group

© 2010 Cisco Systems, Inc. All rights reserved.

– Nick Lippis, The Lippis Report, Podcast

Cisco Public

© 2010 Cisco and/or its affiliates. All rights reserved.

Presentation_ID

“Medianet is the right technology at the right time on how we can offer tools to manage video.”

Cisco Confidential

281

281

Media-Ready wireless LAN  Delivers high quality, scalable multicast video over the wireless LAN  Prioritizes QoS for critical video content  Scales effectively with client admission policy control  Cisco Aironet 1140, 1250, 3500, 1260 Series Access Points  Access point converts multicast streams to unicast

“The software update also integrates other new features to enhance the quality of experience for streaming video over wireless LAN, delivering a more ‘holistic’ solution than competitors do.”

– Paul Debeasi, TechTarget

© 2010 Cisco and/or its affiliates. All rights reserved.

“Cisco announced software for its Wi-Fi products to improve video performance, reliability and scaling on 802.11n wireless networks. … VideoStream, compensates for Wi-Fi weaknesses that degrade video quality as the number of streams and clients grow.”

– John Cox, Network World

Cisco Public

282

282

Borderless Experience

Anyone

Anything

Anywhere

Anytime Securely, Reliably, Seamlessly

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

283

• Do not get overwhelmed • Small steps can make a big

difference • Remember, to survive a bear

attack, you don’t have to be fastest person…you just need to be faster than the next guy • Do not be the least prepared

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

284

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

285

Thank you.

© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Public

287